Protection against unsolicited communication for internet protocol multimedia subsystem

a technology of multimedia subsystems and internet protocol, applied in special service provision of substations, instruments, digital computers, etc., can solve the problems of high network workload and inability to detect unsolicited calls, and achieve the effect of high network workload, high performance of puci systems, and inability to d

Active Publication Date: 2015-12-29
NEC CORP
View PDF12 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Benefits of technology

[0007]For the establishment of sessions binding operators, all operators do not necessarily have networks each enhanced in terms of the PUCI functionality for testing whether or not incoming calls are unsolicited calls. When the PUCI functionality is available only in the terminating network, other intermediate networks need to route incoming calls to the terminating network. This potentially results in a high workload of networking, since unsolicited calls or malicious calls are not detected but directly rejected by the originating network. Currently, it is impossible to detect unsolicited calls without implementing the overall PUCI functionality. The inventors seek to provide solutions as to how to benefit networks with the basic PUCI functionality by way of small changes of networking, thus demonstrating a high performance of the PUCI system.
[0008]The present invention seeks to solve the above problem by way of the following key features and effects.
[0014](6) It is possible to improve the overall performance because the PUCI-light functionality at the edge of each network relies on only the database query.

Problems solved by technology

This potentially results in a high workload of networking, since unsolicited calls or malicious calls are not detected but directly rejected by the originating network.
Currently, it is impossible to detect unsolicited calls without implementing the overall PUCI functionality.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Protection against unsolicited communication for internet protocol multimedia subsystem
  • Protection against unsolicited communication for internet protocol multimedia subsystem
  • Protection against unsolicited communication for internet protocol multimedia subsystem

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0021]The overall PUCI functionality is reduced to a limited functionality which is directly implemented as a part of the IMS. The present invention seeks a method as to how to exchange the PUCI information related to specific calls among the interconnected networks, thus directly blocking further unsolicited communications.

[0022]The present invention is designed to implement one of global operator policy (OP) databases in the first contact point of the user equipment (UE) to the IMS, and the proxy call session control function (P-CSCF) or the interconnect border control function (IBCF) and / or the interrogating call session control function (I-CSCF) in the case of the IMS peering. The PUCI-light functionality is implemented not only as a part of the core IMS functionality (i.e. an integral part of the P-CSCF, I-CSCF, S-CSCF, and IBCF) but also as any other SIP-based systems (e.g. SIP proxy / server, SBC), thus achieving the PUCI-light functionality at the edge of the network.

[0023]The...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A PUCI system is designed to process an incoming call originated by the user equipment toward the counterpart user equipment via an EMS node having a PUCI-light functionality, which includes an IBCF / I-CSCF, a S-CSCF, and a database storing the PUCI-light information. Through a query to the database indicating a suspicious session in relation to the incoming call, the IMS node immediately blocks the suspicious session or simply marks the suspicious session for the further processing at a subsequent node. The reason for rejection is included in a SIP BYE / ERROR message of an original session setup message, which is interpreted by a previous IMS node so as to obtain the relevant information from a SIP header. The relevant information is stored in either a global operator policy database or a local database, thus enabling a PUCI-negating IMS node to reject an unsolicited call related to the blocked session.

Description

[0001]The present application is the National Phase of PCT / JP2009 / 067691, filed Oct. 6, 2009, which claims priority based on Japanese Patent Application No. 2008-260090, the content of which is incorporated herein by reference.TECHNICAL FIELD[0002]The present invention relates to the protection against unsolicited communications for Internet protocol multimedia subsystems.[0003]The present application claims priority based on Japanese Patent Application No. 2008-260090, the content of which is incorporated herein by reference.BACKGROUND ART[0004]Internet protocol multimedia subsystems (IMS) integrate networks such as public switched telephone networks (PSTN) and mobile communication networks so as to provide users (or subscribers) with various communication services, wherein the IMS serving as a pivotal role in the next generation network (NGN) is standardized by the third generation partnership project (3GPP).[0005]Electronic mailing services have suffered from social problems such...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(United States)
IPC IPC(8): H04L12/16H04L29/06
CPCH04L65/1016H04L65/1079H04L65/1006H04L65/1104H04L12/22
Inventor PRASAD, ANAND RAGHAWAKUNZ, ANDREASTAMURA, TOSHIYUKISCHMID, STEFANEWALD, THILO
Owner NEC CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products